converted file.exe

Daneil Jemoch

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions which inject ads in the browser. The application converted file.exe, “Installer for TopApp software” by Daneil Jemoch has been detected as adware by 35 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
TopApp software  (signed by Daneil Jemoch)

Product:
TopApp software

Description:
Installer for TopApp software

Version:
2014.5.23.1127

MD5:
e5610202c52e98681bae7635178e3ce9

SHA-1:
8bd318038fa77f0d7695ee8f0b101586cfe6a805

SHA-256:
0a29501c9fe2eb54cfb55b53402e35fa28d7f65da46132a1a9b69ba5d093b968

Scanner detections:
35 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
5/10/2024 11:33:00 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.659992
418

Agnitum Outpost
Trojan.AntiFW
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2014.09.08

Avira AntiVirus
ADWARE/InstallRex.Gen
7.11.171.32

avast!
Win32:InstalleRex-CD [PUP]
2014.9-151214

AVG
Generic
2016.0.2896

Bitdefender
Application.Generic.659992
1.0.20.1740

Bkav FE
HW32.Paked
1.3.0.4959

Clam AntiVirus
Win.Trojan.Antifw-38
0.98/19342

Comodo Security
Application.Win32.InstalleRex.KG
19447

Dr.Web
Trojan.WebPick.2452
9.0.1.0348

Emsisoft Anti-Malware
Application.Generic.659992
8.15.12.14.09

ESET NOD32
Win32/InstalleRex.M potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.4161048
12/14/2015

F-Prot
W32/InstallRex.B
v6.4.6.5.141

F-Secure
Application.Generic.659992
11.2015-14-12_2

G Data
Application.Generic.659992
15.12.24

IKARUS anti.virus
PUA.InstallBundler
t3scan.1.7.5.0

K7 AntiVirus
Unwanted-Program
13.183.13286

Kaspersky
Trojan.Win32.AntiFW
14.0.0.973

Malwarebytes
PUP.Optional.InstalleRex
v2015.12.14.09

McAfee
PUP-FHQ
5600.6552

MicroWorld eScan
Application.Generic.659992
16.0.0.1044

NANO AntiVirus
Riskware.Win32.InfoLeak.cvgqot
0.28.2.61942

Norman
Application.Generic.659992
11.20151214

nProtect
Trojan/W32.AntiFW.335704
14.09.07.01

Panda Antivirus
PUP/TSUploader
15.12.14.09

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Trojan.AntiFW.A5
12.15.14.00

Reason Heuristics
Adware.WebPick.Installer (M)
15.12.14.9

Rising Antivirus
PE:Trojan.DL.Win32.AntiFW.a!1075355932
23.00.65.151212

Sophos
InstallRex
4.98

Vba32 AntiVirus
Downware.TSU
3.12.26.3

VIPRE Antivirus
Threat.14871
32210

Zillya! Antivirus
Trojan.AntiFW.Win32.249
2.0.0.1913

File size:
327.9 KB (335,728 bytes)

Product version:
1.0.0.3

Copyright:
Copyright © 2014 TopApp software

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\converted file.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/1/2013 7:00:00 PM

Valid to:
9/2/2014 6:59:59 PM

Subject:
CN=Daneil Jemoch, O=Daneil Jemoch, STREET=Dubenskay 3, L=Kiev, S=Kiev, PostalCode=03056, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
49A39B9858F6FBAB7EFD6CE450878DDB

File PE Metadata
Compilation timestamp:
3/12/2013 3:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:GrhbUzkuvcBYC47l2xpi30XNFBLe8zl0yRNGNm3XPUwPa6Y+J/V:GrikuveY3+tNFhJrNf8ls

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9279

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file converted file.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove converted file.exe - Powered by Reason Core Security